Analysis
-
max time kernel
14s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2023 15:18
Behavioral task
behavioral1
Sample
DETAILS 14032023.doc
Resource
win7-20230220-en
General
-
Target
DETAILS 14032023.doc
-
Size
518.4MB
-
MD5
f30f9eed1fc654c010ab7dec52291fbd
-
SHA1
b17388dbcf3a8e437358865c597ba372c7a4a79d
-
SHA256
32b73674bef1bf5a7893ddfff9ab38c3efb281f09838c723cbf5c9f1f5cca10c
-
SHA512
7485d2adad87bbc74281dc555e9e97284a4ef2513093b6e1448c06ddb1fa32bbbf13515a88af2ea14b6136c4f6726ffe4f7929619ab9f57c3d840b36d9cd1faf
-
SSDEEP
6144:5yk1RgZZXbN63GW1Z7krKSUzMNYJJdKkOl950uH54Lg4Ne9C:5/MXJ6WW1Z7ktUgNYJJdKkOHC4D409
Malware Config
Extracted
emotet
Epoch5
103.85.95.4:8080
103.224.241.74:8080
178.238.225.252:8080
37.59.103.148:8080
78.47.204.80:443
138.197.14.67:8080
128.199.242.164:8080
54.37.228.122:443
37.44.244.177:8080
139.59.80.108:8080
218.38.121.17:443
82.98.180.154:7080
114.79.130.68:443
159.65.135.222:7080
174.138.33.49:7080
195.77.239.39:8080
193.194.92.175:443
198.199.70.22:8080
85.214.67.203:8080
93.84.115.205:7080
186.250.48.5:443
46.101.98.60:8080
160.16.143.191:8080
64.227.55.231:8080
175.126.176.79:8080
85.25.120.45:8080
178.62.112.199:8080
185.148.169.10:8080
128.199.217.206:443
103.41.204.169:8080
209.239.112.82:8080
202.28.34.99:8080
139.196.72.155:8080
87.106.97.83:7080
93.104.209.107:8080
104.244.79.94:443
115.178.55.22:80
83.229.80.93:8080
103.254.12.236:7080
62.171.178.147:8080
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
regsvr32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 4544 4656 regsvr32.exe WINWORD.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 41 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4656 WINWORD.EXE 4656 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
WINWORD.EXEpid process 4656 WINWORD.EXE 4656 WINWORD.EXE 4656 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
WINWORD.EXEpid process 4656 WINWORD.EXE 4656 WINWORD.EXE 4656 WINWORD.EXE 4656 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
WINWORD.EXEdescription pid process target process PID 4656 wrote to memory of 4544 4656 WINWORD.EXE regsvr32.exe PID 4656 wrote to memory of 4544 4656 WINWORD.EXE regsvr32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\DETAILS 14032023.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\151945.tmp"2⤵
- Process spawned unexpected child process
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\GjluYzl\cZMUbTxezqHdewmO.dll"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\151945.tmpFilesize
334.9MB
MD5fc5e2fde03f8ee8a683fda96ad9a0b9e
SHA1733be11a461a0d3674887e067d759ab44288a294
SHA256a63bd985eca877db4d5507600ba5ed2f7ce1c0f1952629309d44d36b2553f162
SHA512b4e62bcdbba972d9c1de46a5b10bbef71562ac774400726272e07d6d97356e723c8839ad25d9902b3fa08b498c53dc996064167dedb90b49e2903284f6cf1034
-
C:\Users\Admin\AppData\Local\Temp\151945.tmpFilesize
332.4MB
MD505dd2d64ffdb0676399cd22b92df90f1
SHA166e5a7dbea7f167c65e96f01f18b2c75258c6ac9
SHA25634f1bb6dabbc55a5dcb5c40fdc3afd2cd72acce032ecceefe037bd32abada99f
SHA5126c5363ea928cbd4038bf48924194e5881707c4e2fe770085b9160b3f9756a3013d6047263c43e79f989fd685c3572696df11691c586b2738ca9c91873fe30ce3
-
C:\Users\Admin\AppData\Local\Temp\151945.zipFilesize
845KB
MD52ecd14dbe0acfb6d20dba5f465905864
SHA12455ed294b703ca5bd72d125c21dfc9ca7bc0043
SHA256a9de2a7fb170756cdeff00a4ed19574ffaaf1d59383728002390c8784764912f
SHA512d969534ae1d935438e62bc5640f039bd987774ea4b0f60da700353ec7a8531f288698b1fca17cec583c689f05791735282dc438a84536a9be5fdf0f9688a0b53
-
C:\Windows\System32\GjluYzl\cZMUbTxezqHdewmO.dllFilesize
324.4MB
MD51cd6937ad3e3c9edea24f213eacf4bab
SHA1b95889d00ab2e33f2f40c6dac7e8e869c6ea9935
SHA2561320f55fc77f61b3af69d0fd5e1f991e2950f8c482a3a3b83474ad12330b3cf5
SHA512c4692d49c63f6d08beda88c5e7e0fbf5428fd899866bc6e1166c16a6f7b0d001a623c1f3a453cdc2e65a996ab471bde0f8632a7994aa7c7927d2ebc9047a7c11
-
memory/4544-182-0x0000000002B60000-0x0000000002B8C000-memory.dmpFilesize
176KB
-
memory/4544-185-0x0000000001160000-0x0000000001161000-memory.dmpFilesize
4KB
-
memory/4656-137-0x00007FF83AAD0000-0x00007FF83AAE0000-memory.dmpFilesize
64KB
-
memory/4656-139-0x00007FF83AAD0000-0x00007FF83AAE0000-memory.dmpFilesize
64KB
-
memory/4656-138-0x00007FF83AAD0000-0x00007FF83AAE0000-memory.dmpFilesize
64KB
-
memory/4656-142-0x00007FF8383D0000-0x00007FF8383E0000-memory.dmpFilesize
64KB
-
memory/4656-140-0x00007FF83AAD0000-0x00007FF83AAE0000-memory.dmpFilesize
64KB
-
memory/4656-141-0x00007FF8383D0000-0x00007FF8383E0000-memory.dmpFilesize
64KB
-
memory/4656-136-0x00007FF83AAD0000-0x00007FF83AAE0000-memory.dmpFilesize
64KB
-
memory/4656-210-0x00007FF83AAD0000-0x00007FF83AAE0000-memory.dmpFilesize
64KB
-
memory/4656-209-0x00007FF83AAD0000-0x00007FF83AAE0000-memory.dmpFilesize
64KB
-
memory/4656-211-0x00007FF83AAD0000-0x00007FF83AAE0000-memory.dmpFilesize
64KB
-
memory/4656-212-0x00007FF83AAD0000-0x00007FF83AAE0000-memory.dmpFilesize
64KB